2023
DOI: 10.3390/electronics12061404
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Data Privacy Preserving in Supply Chain Management Using Hybrid Meta-Heuristic Algorithm with Ethereum Blockchain Technology

Abstract: Blockchain is a recently developed advanced technology. It has been assisted by a lot of interest in a decentralized and distributed public ledger system integrated as a peer-to-peer network. A tamper-proof digital framework is created for sharing and storing data, where the linked block structure is utilized to verify and store the data. A trusted consensus method has been adopted to synchronize the changes in the original data. However, it is challenging for Ethereum to maintain security at all blockchain le… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…Combining these approaches, PPTs can ensure the safety of the applicant's data and compliance with data protection regulations. Furthermore, it can also enable the detection of anomalies and prevent malicious activities 100 . While selecting the appropriate methods, we should consider the requirements such as privacy level, data type, analysis or prediction task, and computational overhead.…”
Section: Privacy-preserving Techniques (Ppts)mentioning
confidence: 99%
See 1 more Smart Citation
“…Combining these approaches, PPTs can ensure the safety of the applicant's data and compliance with data protection regulations. Furthermore, it can also enable the detection of anomalies and prevent malicious activities 100 . While selecting the appropriate methods, we should consider the requirements such as privacy level, data type, analysis or prediction task, and computational overhead.…”
Section: Privacy-preserving Techniques (Ppts)mentioning
confidence: 99%
“…Feedback loops are critical for effective functioning. It can provide valuable information about false positives and negatives, improving anomaly detection accuracy, refining thresholds, and enhancing overall performance 100 . Dynamic adaption made the adjustments by consensus parameters or security measures and mitigated the potential attacks based on anomaly detection.…”
Section: Dynamic Adaptationmentioning
confidence: 99%
“…Supply chain management typically involves managing and preserving producer relationships with vendors, administration, and customers to provide higher customer value at a lower cost. The notion of the Internet of Things (IoT), which enables the use of numerous intelligent actuators and sensors connected to the Internet, provides creative ways for monitoring the movement of goods and commodities essential to supply chains [13,14]. It specifically addresses the essential element of supply chain management-the seamless exchange of information about a product between parties involved in its entire life cycle.…”
Section: Supply Chain Management (Scm)mentioning
confidence: 99%
“…It is easy to see that the last step is heuristic in nature. In practice, the heuristics are successfully used for problem solving (e.g., [ 34 , 35 , 36 , 37 ]). However, the security proof in the oracle model can only be treated as a heuristic argument for the security of the cryptographic scheme, but without a guarantee for the security of its real implementation (Bellare and Rogaway [ 38 ]).…”
Section: Signature Scheme Framework Architecture and Its Security Modelmentioning
confidence: 99%